Android

APKLab – Android Reverse Engineering WorkBench For VS Code

0

 

APKLab seamlessly integrates the best open-source tools: ApktoolJadxuber-apk-signer and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE.

Features

  • Decode all the resources from an APK
  • Disassemble the APK to Dalvik bytecode aka Smali
  • Decompile the APK to Java source
  • Analyze & Hack effectively with feature-rich VS Code
  • Build an APK from Smali and resources
  • Rebuild an APK in Debug mode for dynamic analysis
  • Sign the APK seamlessly during the build
  • Install the APK directly from VS Code
  • Support for Apktool-style projects (apktool.yml)
  • Support for most Apktool CLI arguments
  • Android resource frameworks management (Coming soon!)
  • Support for user-provided keystore for APK signing
  • Download and configure missing dependencies
  • Excellent Smali language support with Smalise
  • Supports Linux, Windows, and Mac

Getting Started

Open APK or Apktool project

  • Open the Command Palette (Ctrl+Shift+P) ➜ APKLab: Open an APKdecode.gif
  • Or Just open an existing Apktool project folder

ReBuild and Sign APK

  • Right-Click on or inside apktool.yml file ➜ APKLab: Rebuild the APKrebuild.gif

Install APK to device

  • Right-Click on .apk file (in dist directory) ➜ APKLab: Install the APKinstall.gif

Requirements

  • JDK 8+

    Run java -version in your Shell, if not found download from here.

  • adb

    Run adb devices in your Shell, if not found check this guide.

  • Smalise (recommended)

    It makes working with smali files a breeze.

Extension Settings

Dependency Paths
Keystore configuration

Known Issues

Contribution Guide

For bug reports, feature requests or simply discussing an idea, please open an issue here. PRs are always welcome.

Changelog

Credits

ToRat – Cross Platform Remote Administration tool

Previous article

Freki – Open Source Malware Analysis Platform

Next article

You may also like

Comments

Leave a reply

Your email address will not be published. Required fields are marked *

More in Android